VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

File information
Safety rating:60
Behavior list
Behavior analysis report:         Threatbook file behavior analysis report
Basic Information
MD5:a4b221e76a720b6bbf80a281fcc5678f
file type:Autoit
Production company:OneKey.Cc
version:6.5.12.188---6.5.12.188
Shell or compiler information:COMPILER:Microsoft Visual Studio .NET 2005 -- 2008 -> Microsoft Corporation [Overlay] *
Subfile information:okdos.ima / d7590d02072ca88170cc7762bf43a16d / gzip
AutoItScript / 167de214961f7175e70e411a8ac77886 / Unknown
AutoITdumpFile / bd8131bf0caf090bdb72c79dd3b6426e / Unknown
Bcdedit.dll / 3c2a9f3195cddd8943971dc8a677ef25 / EXE
okldr / d7bfb230a7b533098aa122135ae1bc2c / Unknown
upx_c_7666496cdumpFile / 7611276600d85979496295778c59482a / EXE
ghopwd64.dll / 1bbcf379926e29d93f2020aeb82c6d41 / EXE
grubinst.dll / ec6ecfe076c6367bd4e3caec6dc869f3 / EXE
DataIcon.dll / 79ba9c235207324c83802758ffdc1c97 / DLL
upx_c_8badc1e3dumpFile / 8ecd8240b7b040a9800e0197c531d6fd / EXE
filedisk.dll / 977198b7145e5b42f0f3c439df8e6145 / EXE
dsptw.dll / c3429879521305de064a0952dab5eb6a / EXE
GMD5.dll / 74beeb710418ce737a09f4c36d977b4e / EXE
filedisk.sys / 4a2d7ff9487ca10126600f65bc8fdf5e / SYS
Mountvol.dll / de27405a9e67dc17ab8bd255dbcccc6c / EXE
okldr.mbr / 45adc9461641242cebb6efa53066c040 / Unknown
ShowDrive.dll / 63f0697283a67db3f50b440f142044ed / EXE
ghopwd32.dll / 4ecc093d133419b4ee6758b70b416073 / EXE
帮助.dat / 5dd9360f4df105d8e94604a272e69a36 / Unknown
Key behavior
Behavior description:写权限映射文件
details:CiceroSharedMemDefaultS-1-5-21-1482476501-1645522239-1417001333-500
MSCTF.MarshalInterface.FileMap.EJL..DDDHF
MSCTF.MarshalInterface.FileMap.EJL.B.DFDHF
MSCTF.MarshalInterface.FileMap.EJL.C.CGDHF
MSCTF.MarshalInterface.FileMap.EJL.D.CGDHF
MSCTF.MarshalInterface.FileMap.EJL.E.CHDHF
MSCTF.MarshalInterface.FileMap.EJL.F.CIDHF
MSCTF.MarshalInterface.FileMap.EJL.G.BKDHF
MSCTF.Shared.SFM.EJL
Behavior description:检测自身是否被调试
details:N/A
Behavior description:设置特殊文件夹属性
details:C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
Behavior description:隐藏指定窗口
details:[Window,Class] = [AutoIt v3,AutoIt v3]
[Window,Class] = [,ComboLBox]
[Window,Class] = [高级选项:,Button]
[Window,Class] = [禁用访问 IDE 设备(&D),Button]
[Window,Class] = [密码(&P),Button]
[Window,Class] = [,Edit]
[Window,Class] = [自定义 GHOST 版本(&V),Button]
[Window,Class] = [忽略 CRC 错误(&E),Button]
[Window,Class] = [,ComboBox]
[Window,Class] = [检查 GHO 完整性(&F),Button]
[Window,Class] = [完成后关机(&X),Button]
[Window,Class] = [撤消(&U),Button]
[Window,Class] = [,ListBox]
[Window,Class] = [目录层:,Static]
[Window,Class] = [3,Edit]
Process behavior
Behavior description:隐藏窗口创建进程
details:ImagePath = , CmdLine = c:\windows\system32\cmd.exe /c ping 127.0.0.1 -n 2&del /f /q "c:\docume~1\admini~1\locals~1\temp\filedisk.exe"
ImagePath = , CmdLine = c:\docume~1\admini~1\locals~1\temp\showdrive.exe *
ImagePath = , CmdLine = c:\windows\system32\cmd.exe /c c:\docume~1\admini~1\locals~1\temp\dsptw.exe /a /pdr /y
ImagePath = , CmdLine = c:\windows\system32\cmd.exe /c c:\docume~1\admini~1\locals~1\temp\dsptw.exe 1 /find:all /ghoststyle /y
ImagePath = , CmdLine = c:\windows\system32\cmd.exe /c grubinst.exe --read-only --save=mbr.tmp (hd0)
Behavior description:创建进程
details:ImagePath = C:\WINDOWS\system32\cmd.exe, CmdLine = C:\WINDOWS\system32\cmd.exe /c ping 127.0.0.1 -n 2&del /f /q "C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\filedisk.exe"
ImagePath = C:\WINDOWS\system32\cmd.exe, CmdLine = C:\WINDOWS\system32\cmd.exe /c C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\dsptw.exe /a /pdr /y
ImagePath = C:\WINDOWS\system32\cmd.exe, CmdLine = C:\WINDOWS\system32\cmd.exe /c C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\dsptw.exe 1 /find:all /ghoststyle /y
ImagePath = C:\WINDOWS\system32\cmd.exe, CmdLine = C:\WINDOWS\system32\cmd.exe /c grubinst.exe --read-only --save=MBR.tmp (hd0)
Behavior description:创建新文件进程
details:ImagePath = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\ShowDrive.exe, CmdLine = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\ShowDrive.exe *
ImagePath = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\dsptw.exe, CmdLine = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\dsptw.exe /a /pdr /y
ImagePath = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\dsptw.exe, CmdLine = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\dsptw.exe 1 /find:all /ghoststyle /y
ImagePath = C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\grubinst.exe, CmdLine = grubinst.exe --read-only --save=MBR.tmp (hd0)
File behavior
Behavior description:写权限映射文件
details:CiceroSharedMemDefaultS-1-5-21-1482476501-1645522239-1417001333-500
MSCTF.MarshalInterface.FileMap.EJL..DDDHF
MSCTF.MarshalInterface.FileMap.EJL.B.DFDHF
MSCTF.MarshalInterface.FileMap.EJL.C.CGDHF
MSCTF.MarshalInterface.FileMap.EJL.D.CGDHF
MSCTF.MarshalInterface.FileMap.EJL.E.CHDHF
MSCTF.MarshalInterface.FileMap.EJL.F.CIDHF
MSCTF.MarshalInterface.FileMap.EJL.G.BKDHF
MSCTF.Shared.SFM.EJL
Behavior description:创建可执行文件
details:C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\filedisk.exe
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\DataIcon.dll
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\aut6.tmp
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\dsptw.exe
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\ShowDrive.exe
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\grubinst.exe
Behavior description:修改文件内容
details:C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\aut4.tmp---> Offset = 16384
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\aut5.tmp---> Offset = 24576
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\aut7.tmp---> Offset = 0
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\DataIcon.dll---> Offset = 58350
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\DataIcon.dll---> Offset = 58370
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\DataIcon.dll---> Offset = 58388
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\aut8.tmp---> Offset = 24576
C:\DOCUME~1\ADMINI~1\LOCALS~1\Temp\MBR.tmp---> Offset = 0
Behavior description:设置特殊文件夹属性
details:C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files
C:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5
C:\Documents and Settings\Administrator\Local Settings\History
C:\Documents and Settings\Administrator\Local Settings\History\History.IE5
C:\Documents and Settings\Administrator\Cookies
Network behavior
Behavior description:连接指定站点
details:InternetConnectA: ServerName = hi.baidu.com, PORT = 80
InternetConnectA: ServerName = www.onekey.cc, PORT = 80
Behavior description:打开HTTP请求
details:HttpOpenRequestA: hi.baidu.com:80/zhuhaiit/blog/item/d9f3b2a8918c58f61f17a209.html, hConnect = 0x0000055c
HttpOpenRequestA: www.onekey.cc:80/soft/update.html, hConnect = 0x0000064c
Registry behavior
Behavior description:修改注册表
details:\REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\Windows\CurrentVersion\Internet Settings\GlobalUserOffline
\REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
Behavior description:删除注册表键值_IE连接设置
details:\REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyServer
\REGISTRY\USER\S-1-5-21-1482476501-1645522239-1417001333-500\Software\Microsoft\Windows\CurrentVersion\Internet Settings\AutoConfigURL
Other behavior
Behavior description:检测自身是否被调试
details:N/A
Behavior description:创建互斥体
details:CTF.LBES.MutexDefaultS-1-5-21-1482476501-1645522239-1417001333-500
CTF.Compart.MutexDefaultS-1-5-21-1482476501-1645522239-1417001333-500
CTF.Asm.MutexDefaultS-1-5-21-1482476501-1645522239-1417001333-500
CTF.Layouts.MutexDefaultS-1-5-21-1482476501-1645522239-1417001333-500
CTF.TMD.MutexDefaultS-1-5-21-1482476501-1645522239-1417001333-500
CTF.TimListCache.FMPDefaultS-1-5-21-1482476501-1645522239-1417001333-500MUTEX.DefaultS-1-5-21-1482476501-1645522239-1417001333-500
SHIMLIB_LOG_MUTEX
RasPbFile
MSCTF.Shared.MUTEX.AEH
MSCTF.Shared.MUTEX.EJL
Behavior description:隐藏指定窗口
details:[Window,Class] = [AutoIt v3,AutoIt v3]
[Window,Class] = [,ComboLBox]
[Window,Class] = [高级选项:,Button]
[Window,Class] = [禁用访问 IDE 设备(&D),Button]
[Window,Class] = [密码(&P),Button]
[Window,Class] = [,Edit]
[Window,Class] = [自定义 GHOST 版本(&V),Button]
[Window,Class] = [忽略 CRC 错误(&E),Button]
[Window,Class] = [,ComboBox]
[Window,Class] = [检查 GHO 完整性(&F),Button]
[Window,Class] = [完成后关机(&X),Button]
[Window,Class] = [撤消(&U),Button]
[Window,Class] = [,ListBox]
[Window,Class] = [目录层:,Static]
[Window,Class] = [3,Edit]
Behavior description:查找指定窗口
details:NtUserFindWindowEx: [Class,Window] = [Shell_TrayWnd,]
NtUserFindWindowEx: [Class,Window] = [CicLoaderWndClass,]
Behavior description:枚举窗口
details:N/A
Behavior description:获取系统权限
details:SE_LOAD_DRIVER_PRIVILEGE
Behavior description:窗口信息
details:Pid = 2960, Hwnd=0x10358, Text = 还原分区(&R), ClassName = Button(RadioButton).
Pid = 2960, Hwnd=0x1035a, Text = 备份分区(&B), ClassName = Button(RadioButton).
Pid = 2960, Hwnd=0x1035e, Text = &Ghost32, ClassName = Button(CheckBox).
Pid = 2960, Hwnd=0x10360, Text = 安装(&I), ClassName = Button(CheckBox).
Pid = 2960, Hwnd=0x10362, Text = Ghost 映像文件路径:, ClassName = Button(GroupBox).
Pid = 2960, Hwnd=0x10364, Text = C:\GHOST\C_WINXP.GHO, ClassName = ComboBox.
Pid = 2960, Hwnd=0x10368, Text = C:\GHOST\C_WINXP.GHO, ClassName = Edit.
Pid = 2960, Hwnd=0x1036c, Text = 保存(&S), ClassName = Button.
Pid = 2960, Hwnd=0x10374, Text = 高级选项:, ClassName = Button(GroupBox).
Pid = 2960, Hwnd=0x10376, Text = 禁用访问 IDE 设备(&D), ClassName = Button(CheckBox).
Pid = 2960, Hwnd=0x10378, Text = 密码(&P), ClassName = Button(CheckBox).
Pid = 2960, Hwnd=0x1037e, Text = 自定义 GHOST 版本(&V), ClassName = Button(CheckBox).
Pid = 2960, Hwnd=0x10380, Text = 忽略 CRC 错误(&E), ClassName = Button(CheckBox).
Pid = 2960, Hwnd=0x10382, Text = 快速压缩, ClassName = ComboBox.
Pid = 2960, Hwnd=0x10386, Text = 不分卷, ClassName = ComboBox.
Behavior description:直接操作物理设备
details:\??\PhysicalDrive0
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
中国反网络病毒联盟
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号